On February 10, 2026, the European Commission provided unconditional antitrust approval for Google's proposed $32 billion acquisition of the prominent cybersecurity firm Wiz. This landmark decision allows Google to proceed with its strategic acquisition, which is aimed at significantly enhancing the security capabilities of its Google Cloud Platform (GCP). The EU's antitrust regulators determined that the merger would not stifle competition, citing Google's market position behind rivals Amazon Web Services (AWS) and Microsoft Azure. The Commission's statement emphasized that customers will retain a healthy number of credible alternatives for cloud security and infrastructure. This approval is a major event in the cybersecurity industry, reflecting a trend of major cloud providers acquiring and integrating security companies to offer more comprehensive, native security solutions.
EU antitrust chief Teresa Ribera justified the decision by stating, "Google stands behind Amazon and Microsoft in terms of market shares in cloud infrastructure, and our assessment confirmed that customers will continue to have credible alternatives and the ability to switch providers."
This indicates the Commission's belief that even with Wiz's technology integrated into GCP, the market will remain competitive. Wiz is a leader in the Cloud Native Application Protection Platform (CNAPP) space, and its integration will give Google a powerful native security offering.
This acquisition will have a profound and lasting impact on the cloud and cybersecurity industries:
For organizations that are customers of Google Cloud or Wiz, the immediate impact is minimal. However, they should begin strategic planning:
The European Commission grants unconditional antitrust approval for the Google-Wiz acquisition.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.